Publisher
Springer International Publishing
Reference12 articles.
1. Wurzenberger, M., Skopik, F., Settanni, G.: Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools. Inf. Syst. 60(C), 13–33 (2016)
2. Wang, Y.: Food information management and security strategy of computer network. Adv. J. Food Sci. Technol. 11(12), 792–794 (2016)
3. Sommestad, T., Sandström, F.: An empirical test of the accuracy of an attack graph analysis tool. Inf. Comput. Secur. 23(5), 516–531 (2015)
4. Shuo, L., Chai, B., Zhang, X.: Collaborative filtering algorithm based on improved nearest neighbors. Comput. Eng. Appl. 39(1), 53–58 (2015)
5. Bisht, N., Ahmad, A., Bisht, S.: Application of feature selection methods and ensembles on network security dataset. Int. J. Comput. Appl. 135(11), 1–5 (2016)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献